{"id":2122,"date":"2006-03-29T00:00:00","date_gmt":"2006-03-29T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/29\/idc-data-centers-becoming-smaller-faster\/"},"modified":"2021-12-30T11:40:43","modified_gmt":"2021-12-30T11:40:43","slug":"idc-data-centers-becoming-smaller-faster","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/29\/idc-data-centers-becoming-smaller-faster\/","title":{"rendered":"IDC: Data Centers Becoming Smaller, Faster"},"content":{"rendered":"<p>U.S. data centers are starting to look trimmer and run faster thanks to virtualization and automation tools, according to research firm IDC.   Data centers are becoming more utilized and therefore denser and hotter. The number of pieces of data center equipment is also slimming down to include fewer machines.   For example, with virtualization, customers can run multiple operating systems on one machine, reducing the number of machines they need to run their businesses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Virtualization, simplification, optimization and automation are all key drivers influencing the successful transformation of the U.S. data center,&#8221; said IDC analyst Michelle Bailey.<\/p>\n<p>Where mainframes once ruled the data center roost almost exclusively, smaller blades that slide in and out of chassis are becoming more prevalent these days.<\/p>\n<p>Blades, which IDC said grew 49.3 percent as a market year over year and climbed 56.9 percent from 2004 to 2005, boast designs and redundant capabilities to allow one server to keep up and running after another winks out.  Blades are arriving en masse at the same time as heavy Web applications, such as customer relationship management or human resource management products from SAP or Oracle.<\/p>\n<p>http:\/\/www.internetnews.com\/ent-news\/article.php\/3594871<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2122","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2122"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2122\/revisions"}],"predecessor-version":[{"id":4609,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2122\/revisions\/4609"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}